Sunday, January 11, 2015

Intellectual property at Work



When a creator crafts intellectual property right (IPR) material, such as a new idea for a widget X, then the rights of such normally devolve onto her. This also includes matters of trade secrets. However there are a number of exceptions. One of these is if this inventive process occurs whilst in the employ of others. This is to stop a worker who having been paid, used resources and spent time denies the company the benefit of their work, A case such as the US SC's CCNV v. Reid can viewed as an aid to determine the test for if the work was made in the course of employment.


An example of such a term in a contract explicitly waiver any authorship rights would be:
"
An invention or discovery made by you will normally belong to you.  However, an invention or discovery made by you will become our property if it was made:-

a. in the course of your normal duties under such circumstances that an invention might reasonably be expected to result from those duties;

b. outside the course of your normal duties, but during duties specifically assigned to you, when an invention might reasonably be expected to result from these;
"


Note that IPR are ideas from people and not the people themselves. For instance there have been attempts to prevent people from working in related other companies in the same industries, so as to clamp down on potential IPR breaches. However this has been curtailed severely - in the EU by right to work provisions and in the US by perceived restrictions on Free trade. Thus if the worker brings her own talent, then that is acceptable : not worked on code which would be considered a theft of IPR. Likewise, customer lists and contact details would be items which cannot be used by the employee in a new job.


Another check on a broad application of this would be how related the IPR is to the work. So while what an employee develops while working in a company belongs to the company, if it outside the remand of her day to day working milieu then a case could be argued it belongs to the employee. For instance the work Einstein crafted on relativity at the Berne Patent office, if he had wished to apply IPR to it, would fall certainly within this.

Sunday, January 4, 2015

Third party doctrine and the expectation of privacy.



Third party doctrine and the expectation of privacy.

Information has always been of value. For instance in Classical times Caesar's public letters were distributed to the public to glorify his campaigns while his private correspondences of military plans were encrypted with the cipher that bears his name. What both have in common is they need to be handed over to another person for distribution, a third party.



When sending an electronic communication the final act of the writer is to press the send button. Normally this message will appear almost instantly at the recipient's destination. Simple. Simple that is to the user, but the framework on how this occurs is complex. The message must be dissembled under known protocols, shunted between numerous servers and then re-assembled. This process involves various different stakeholders who control the servers and email infrastructure; third-parties into whose hand the message is entrusted. From a legal perspective, what are the levels of privacy involved?

In a letter, there is both the core message and address. While the former has levels of legal protection it is the address, which can be described as metadata, which has been held to be view able by the state,
Two legal cases provide the groundwork for this in the US. In United States v. Miller (1976) during an accident response, untaxed excise material was discovered which lead to an unwarranted search on the defendant's bank records. On appeal it was held there was no "expectation of privacy" due to the commercial nature of these bank records having been created from a voluntarily interaction in the normal course of business. This was affirmed later in the context of e-communications in Smith v. Maryland (1979).This revolved around crank phone calls and the police acting to record the Defendant's dialed numbers. Again it was held that as telephone communications being part of normal business practices then these were not private. Hence it appears that any such metadata information being handed over so as to transmit to another is covered by this.

Whether this ruling will remain in place, specially in light of the recent years Snowden revelations, will be in focus in a number of cases. For instance in the US the Klayman v Obama seeks to distinguish between Maryland and that of the surveillance program by the key differentials of the technologies used and the bulk nature of the collection which are now subject to various data mining techniques and processing power that was not available during the initial rulings in the 1970s. Thus the upcoming judgment on this and other related cases will provide an interesting start to 2015.


See also:
Cellular Convergence and the Death of Privacy by Stephen B. Wicker
If the Supreme Court tackles the NSA in 2015, it’ll be one of these five cases - Ars Technica